General

Malaysia’s trusted Islamic insurance company partners with LogRhythm to ramp up security for new digital services

Syarikat Takaful Malaysia Keluarga Berhad (Takaful Malaysia), is a home-grown Islamic insurance provider committed to helping customers achieve their ambitions of a brighter and financially secure future since 1984. For more than thirty-five years, Takaful Malaysia has evolved alongside the…

Read More
14 Cloud Usage Costs That Could Bust Your Tech Budget

Ransomware Attacks Are Not Increasing In Sophistication

As 2021 ends, one critical theme remains constant within the world of enterprise security — ransomware attacks are continuing to rise, year-over-year, across private and public entities.

Read More
Is Your SOC Ready for IT & OT Convergence

Is Your SOC Ready for IT and OT Convergence

Read More
James Carder and experts thumbnail

FutureCISO Security Alert: Worst cyber security vulnerability

Log4J is a logging library for Java. It is used to debug software during its development lifecycle and entails inserting log statements into code. It is developed and maintained by the open-source Apache Software Foundation and runs on all major platforms including Windows, Linux,…

Read More
Joanne Wong Headshot

The 2022 cybersecurity predictions bonanza

2021 was a difficult year for the CISO – and it looks like 2022 will be no different. From the continuing rise of Zero Trust to the difficulties the FIFA World Cup Qatar 2022 might face, here are some of…

Read More
Forbes

9 Essential Steps To Take When Your Business Is Hit By A Ransomware Attack

Nine industry experts from Forbes Technology Council share essential steps tech leaders need to take when a ransomware attack strikes their business.

Read More

Log4J: How it works and how to remediate the vulnerability in your environment

Read More

CISOs on the front line: What’s ahead for cybersecurity in 2022

Cybersecurity is ever-evolving. For CISOs to continue tackling the threat landscape successfully, they must implement more sophisticated defense strategies in 2022 to mirror the increasing sophistication of the methods used by hackers. Kev Eley, Vice President Sales, Europe at LogRhythm,…

Read More
Joanne Wong_landscape_thumbnail

Leading security vendors announce top 15 cybersecurity predictions to impact 2022

GUEST OPINION: WatchGuard Technologies, Attivo Networks and LogRhythm have announced their leading cyber security predictions for 2022 supporting businesses understand where their next set of threats will be and to ensure enterprises remain in step ahead of these risks. Joanne…

Read More

The SOC Modernization Checklist

Learn what you need to take your security program to the next level.

Read More
Looking in rear view mirror

A Look Back at Which Predictions Came True in 2021

In 2021, cybercriminals took aim at critical infrastructure with ransomware attacks on Colonial Pipeline, JBS and others. They also continued to find new ways to exploit employees working remotely, those seeking information on COVID-19 vaccines, and improperly secured APIs. In…

Read More
Joanne Wong_Feature Image

Putting zero trust IT security to work in a post-pandemic world

As businesses come to terms with the reality of operating amid the legacy of Covid-19, many are realising their old approach to IT security is no longer up to the task, writes Joanne Wong, Vice President International Marketing APAC and…

Read More
14 Cloud Usage Costs That Could Bust Your Tech Budget

8 Crystal Ball Predictions About Cyberattacks In 2022

Industry experts share their top concerns for cybersecurity in 2022.

Read More
Image of Kev Eley to the left and the helpnet and LogRhythm logo's to the right, cybersecurity threats and challenges in 2022

2022: threats and future cybersecurity challenges

How do you ensure your business thrives, not just survives in cybersecurity, with its various evolving threats and challenges? To help get you started, Kev Eley, VP of Sales, Europe, has taken a deep dive into the potential 2022 threat…

Read More

The Evolution and Life of a CISO

Read More
Joanne Wong_zoomed

How XDR can help to extract more value from your SIEM

Joanne Wong from LogRhythm explains how stakeholders can leverage XDR to gain a clearer picture of developments across their organisations.  

Read More
The Curious Podcast

The CurIOus Podcast Interview – Joanne Wong, LogRhythm VP, International Marketing

The CurIOus Podcast with Grace Chng and Lena Soh-Ng. Hear the secrets of successful women in Science and Tech in Asia. In this episode, Joanne Wong, speaks to Grace and Lena at The #CurIOusPodcast to share her perspective on the best #cybersecurity defense, advice…

Read More
Multi-Tenant Deployments

Understanding Multi-Tenant Deployments Within the SIEM Platform

The idea of multi-tenant infrastructure and deployments is not new in the cybersecurity landscape. For years, Cisco and Palo Alto firewalls and Citrix and F5 load balancers have supported the idea of a tenant-based deployment.  The idea of supporting tenants…

Read More